Contact Us

For Marketing, Sales and Subscriptions Inquiries
2637 E Atlantic Blvd #43110
Pompano Beach, FL 33062
USA

Conference List

Review of Information Engineering and Applications

June 2018, Volume 5, 2, pp 41-48

Creation of Algoritms for Recommendation System Based on Users Data on Internet Advertisement Marketing

Kamala K. Hashimova

Kamala K. Hashimova 1

  1. Institute of Information Technology ANAS, Baku, Azerbaijan 1

on Google Scholar
on PubMed

Pages: 41-48

DOI: 10.18488/journal.79.2018.52.41.48

Share :

Article History:

Received: 13 August, 2018
Revised: 17 September, 2018
Accepted: 23 October, 2018
Published: 19 November, 2018


Abstract:

Nowadays, products are offered to buyers in different varieties and qualities on the Internet environment. Recommedation systems are needed to make the right choices and make effective decisions. The article offers a new method and algorithm based on data obtaned through different ways and by creating hybrid recommendation systems. Estimation method is given based on information about objects and users for proper development of the algorithm. The proposed method can identify the proximity between the users group and the objects the users are interested in.
Contribution/ Originality

Keywords:

Internet-advertising data, Hybrid recommendation systems Filtration, Collaboration filter, Proximity measure.

Reference:


Statistics:

Google Scholor ideas Microsoft Academic Search bing Google Scholor

Funding:

This study received no specific financial support.

Competing Interests:

The authors declare that they have no competing interests.

Acknowledgement:


Related Article

( 1 ) Creation of Algoritms for Recommendation System Based on Users Data on Internet Advertisement Marketing
( 3 ) Forecasting Air Passengers of Changi Airport Based on Seasonal Decomposition and an LSSVM Model
( 4 ) Investigate of Mechanical Fuse in Cardan Shaft Using FEM
( 5 ) Quasi 3d Refined Simulation of Flow and Pollutant Transport in the Yangtze River
( 6 ) Vlsi Architecture of Mimo Detector Using Fixed Complexity Sphere Decoding
( 7 ) Verification Method of Complex Web-Services
( 8 ) Space Technology to Monitor the Tornado That Hit Brahmanbaria Dist. of Bangladesh in 2013 and Damaged A Lot
( 9 ) Meteorological and Hydrological Disasters Bangladesh Experiences Every Year Monitored Through Space Technology
( 10 ) An Unified Approach by Implementing the Secured Authentication Protocol Scheme in Wireless Sensor Networks
( 11 ) Web Pages Categorization Based on Classification & Outlier Analysis through FSVM
( 12 ) Information and Communication Technology (Ict) As a Necessity for Libraries and Librarians of Nigerian Universities in the 21st Century
( 13 ) A Study on Commensal Mortality Rate of a Typical Three Species Syn-Eco-System with Unlimited Resources for Commensal
( 14 ) Analytical Review of SQL Server Optimization
( 15 ) Information and Communication Technology in Classroom Situations in Rural and Urban Areas in Zimbabwe: A Comparative Study on the Use of Digital and Projected Media in Teaching and Learning at Six Secondary Schools in Masvingo
( 16 ) On Homogeneous Cubic Equation with Fourunknowns x3+y3= 2lzw2
( 17 ) Some Relations on Gegenbauer Matrix Polynomials
( 18 ) Predict Survival of Patients with Lung Cancer Using an Ensemble Feature Selection Algorithm and Classification Methods in Data Mining
( 19 ) Postbuckling Analysis of Functionally Graded Beams Using Hyperbolic Shear Deformation Theory
( 20 ) Classification and Identification of Risk Management Techniques for Mitigating Risks with Factor Analysis Technique in Software Risk Management
( 21 ) Information about Simulation Software for Testing of Wireless Network
( 22 ) A Detailed Analysis of Software Cost Estimation Using Cosmic-FFP
( 23 ) Investigation on the Dependence of TCP Upstream Throughput on Snr for Single and Multiple Links in a Wlan System
( 24 ) Received Signal Strength in a Macrocell in Lagos Environs Using Finite Element Method
( 25 ) RLS Fixed-Lag Smoother Using Covariance Information Based on Innovation Approach in Linear Continuous Stochastic Systems
( 26 ) Real-Time Workload Scheduling (RTWS) Algorithm for Cloud
( 27 ) Current Trends in Software Engineering Research
( 28 ) Security Issues with Contactless Bank Cards
( 29 ) Big Data in Homeland Security
( 30 ) Performance Analysis of Routing Protocols for CBR Traffic in Mobile Ad-Hoc Networks
( 31 ) Enhanced Isolation Mimo Antenna with DGS Structures for Long Term Evolution Systems
( 32 ) High Isolation Microstrip Mimo Antennas for Wlan Systems
( 33 ) Generalized Quantum Key Distribution for WDM Router Applications
( 34 ) Q Determination of Transmission GPR Waves in Absorbing Media
( 35 ) Selection of Appropriate Equipment for Designing Effective Vacuum System
( 36 ) Web Service Composition for E-Commerce Web Application
( 37 ) To Convalesce Task Scheduling in a Decentralized Cloud Computing Environment
( 38 ) Lossless Image Compression and Decompression to Improve the PSNR and MSE Values Using Architecture
( 39 ) Co-Development of Process Planning and Structural Configurations Considering Machine’s Accessibility in a Reconfigurable Setup
( 40 ) Role of Library and Information Science Professionals in the Knowledge Society
( 41 ) About the Calculation Method of the Coefficient that Shows Significance Extent of Geometric Characteristics in Determination of Racial and Ethnic Identity of Human
( 42 ) A Comprehensive Review of Semiconductor-Type Gas Sensors for Environmental Monitoring
( 43 ) Analysis of Suitable Security Protocols for Apply a Model of Identity in the Civil Registry of Ecuador
( 44 ) Path Loss Measurement and Modeling for Lagos State G.S.M Environments
( 45 ) Computational Modeling of Multi-Purpose Amphibious Aircraft Be-103
( 46 ) Simulation of the Performance of CdTe/CdS/ZnO Multi- Junction Thin Film Solar Cell
( 47 ) Solving Nonlinear Single-Unit Commitment Problem by Genetic Algorithm Based Clustering Technique
( 48 ) OFDM Channel Estimation Based on Novel Local Search Particle Swarm Optimization Algorithm
( 49 ) FPGA Implementation of MC-CDMA Wireless Communication System Based on SDR-A Review
( 50 ) Perturbation Functions for Compact Database
( 51 ) PAPR Reduction Using Eight Factors Rotating Phase Shift Technique Based on Local Search Algorithm in OFDM
( 52 ) Chaotic Particle Swarm Optimization for Imprecise Combined Economic and Emission Dispatch Problem
( 53 ) Using ICT Policy Framework as a Panacea for Economic Recession and Instability in Nigeria
( 54 ) A Common Operational Picture in Support of Situational Awareness for Efficient Emergency Response Operations
( 55 ) Development Problems of Information Provision on the Management of High Technology Park
( 56 ) Comprehensive Analysis & Performance Comparison of Clustering Algorithms for Big Data
( 57 ) A Security Scheme for Protecting Agent Societies
( 58 ) Security Threats and Privacy Issues in Vehicular Ad-Hoc Network (VANET): Survey and Perspective
( 59 ) Detection and Prevention of Phishing Attack Using Linkguard Algorithm
( 60 ) Smart Campus: An Implementation of a Cloud-Based Mobile Learning Application
( 61 ) Survey of Image Processing Based Applications in AMR
( 62 ) Methods of Organizing the Technological Process of Software Development
( 63 ) Fault Tolerance in Real Time Distributed System
( 64 ) Current Approaches in Prediction of PVT Properties of Reservoir Oils
( 66 ) A Survey on Efficient Power Management Using Smart Socket and IoT
( 67 ) Development and Performance Analysis of Bisection Method-Based Optimal Path Length Algorithm for Terrestrial Microwave Link
( 68 ) Development of Facilitated Participatory Spatial Information System for Selected Urban Management Services
( 69 ) Stanford University Interim Propagation Loss Model for a Gmelina Arborea Tree-Lined Road
( 70 ) Characterisation of Propagation Loss for a 3G Cellular Network in a Crowded Market Area Using CCIR Model
( 71 ) Development of Web Application for University of Uyo Post UTME Examination Timetable
( 72 ) Estimation of Viscosity of Azerbaijan Crude Oil
( 73 ) Network Traffic Analysis Using Queuing Model and Regression Technique
( 74 ) Behavioural Intention to Use Mobile Apps by Gen Y in Malaysia
( 75 ) Shortcomings in Traffic Control Devices on Rural Highways of Pakistan and their Rectifications
( 76 ) Design of Automated Departmental Lecture Timetable System
( 77 ) Classification Ensemble Based Anomaly Detection in Network Traffic
( 78 ) Design of Automated Departmental Lecture Timetable System
( 79 ) Identification of Privacy and Security Risks of Internet of Things: An Empirical Investigation
( 80 ) An Examination of the Methods of Increasing Software Efficiency Based on Soft Computing Technology
( 81 ) A Framework for Digital Forensic in Joint Heterogeneous Cloud Computing Environment